Description: In this episode of Tektip we review a tool we created kippo2Wordlist.
Description: kippo2Wordlist is a python program that reads logs from kippo to create a wordlist that can be used for anything a standard wordlist is used for such as pipal analysis, cracking passwords, and the like.
Installation: You can download the script from github. You can also clone the git repository if you have git installed. Place in any directory you like. I put it at:
/opt/kipp2Wordlist/
If you are using honeydrive and haven't changed where the logs for kippo go you are all set. Just run the script and it will function as designed.
honeydrive@honeydrive:/opt/kippo2Wordlist$ python kippo2Wordlist.py
If you are not using honeydrive or have modified log paths, open kippo2Wordlist in your favorite text editor and modify the variables as needed:
# variables for the kippo logs, if your path is not the default from honeydrive, modify logPath.
# if your log files are not named kippo.log or kippor.log.x please modify logPre.
logPre = 'kippo.log'
logPath = '/opt/kippo/log/'
Once the variables are set appropriatley you can simply run the script as shown above. When the script completes it will outup the wordlist to:
outputFile = '/opt/kippo/log/wordlist.txt'
*Feel free to change this variable as well if you would like to output to a different directory or file name.
Now you can view the wordlist to ensure that the script has done what is supposed to.
honeydrive@honeydrive:/opt/kippo2Wordlist$ cat /opt/kippo/log/wordlist.txt
www.TekDefense.com
Tags: Kippo , password , python , wordlist , Tekdefense , Tektip , 1aN0rmus ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.